Flipped Classroom Lecture 20/9 [RG]: Malware
Content
Basic concepts and terminology related to malware. Propagation techniques: worms, virus, and trojan horses. Payloads: ransomware, zombie. Countermeasures. The case of Stuxnet.
The live lecture will consist of two parts. In the first part you will be divided in groups and you will discuss few questions (from previous exams) related to malware. At the end of the first part someone can present solutions and we will discuss about motivations. In the second part we will answer questions regarding malware.
Please, watch the videos and try to solve the previous-exam exercise before the live lecture.
Previous exam questions (true/false)
- To identify if a program contains a virus, it is sufficient to check for the presence of a fixed binary fragment in the program code.
- To identify malware, untrusted software can be executed in a controlled environment that monitors the software’s behavior.
- A botnet is a network of compromised computers that are controlled by an attacker.
- An encrypting malware is a malware that uses encryption to make the binary of each infection unique.
- If a ransomware uses asymmetric encryption, then it is possible to recover the encrypted files by extracting the encryption key from the malware memory while the malware is running.
- A secure mechanism to detect malware is to execute unknown applications on your own computer and periodically inspect the application binary.
Lab Exercise
Reading
- Chapter 10 in Gollmann (2011).
- Chapter 21.3 Trojans, Viruses, Worms and Rootkits in Anderson (2008).
Other resources
Slides
Videos
Propagation methods:
Payloads:
Other techniques